.fusion-header-wrapper { padding-top: 0px;background: #000dbb !important;} #page-header { display:none;} .fusion-header-wrapper.fusion-is-sticky { visibility: visible;}.post-content {padding-top: 30px;}
/* CSS to help with ACF styling */ .fusion-logo img { opacity: 0; } .fusion-main-menu > ul > li > a { border-color: #444; } .fusion-logo-link { background: url(https://www.fairwarning.com/wp-content/themes/Avada-Child-Theme/images/dark-logos2.png); } .fusion-main-menu .fusion-main-menu-icon:after, .fusion-main-menu .fusion-widget-cart-counter > a:before { color: #696969; } .fusion-header { background-color: #fff !important; } .fusion-header-wrapper { padding-top: 0px; background: #ffffff !important; } .fusion-is-sticky .fusion-main-menu > ul > li > a { font-size: 14px; } .fusion-main-menu > ul > li > a, .fusion-main-menu > ul > li > a .fusion-menu-description { color: #444 !important; } .fusion-main-menu > ul > li > a:hover { color: #444 !important; font-weight: bold; } .fusion-body .fusion-main-menu .current-menu-parent > a { color: #444 !important; font-weight: bold !important; } .fusion-header-wrapper { background: transparent !important; }
/* CSS to help with ACF styling */ #page-header .h1 {color: #444;} #page-header h2.text-color-xsdn-color {color: #444;}
/* CSS to help with ACF styling */ #page-header .h1 {color: #fff;} #page-header h2.text-color-xsdn-color {color: #fff;}
/* CSS to help with ACF styling */ #page-header .h1 {color: ;} #page-header h2.text-color-xsdn-color {color: ;}
/* CSS to help with ACF styling */ #page-header {background-color: #031ac3;}
/* CSS to help with ACF styling */ #page-header {background: #fff url() center center; padding-top: 0px; padding-bottom: 0px; } @media all and (max-width: 4699px) and (min-width: 1925px) { .title-and-subtitle-background-image { padding-top: 3% !important; padding-bottom: 3% !important; } }
/* CSS to help with ACF styling */ #page-header {background: ;}

Over the next few weeks, FairWarning will roll out a 4-part blog-post series outlining the ways your organization can leverage FairWarning to maximize the value of Salesforce data.  The posts will outline some of the main security risks that accompany the growing prominence of Salesforce in modern businesses. Future posts will touch upon usage and adoption, information security, compliance, and performance issues when utilizing Salesforce.

Unlock the Potential of Salesforce: Expanding Trust in Cloud Applications

Since its initial introduction, the Salesforce application has evolved considerably. What started as an application for cloud-based customer relationship management has gradually become a comprehensive information-storage system, tightly integrated with almost all the critical functions of modern business. The number of organizations adopting Salesforce grows each day, but such growth brings emergent risks that will need to be actively managed if data integrity is to be maintained.

In the following, we offer an overview of Salesforce, the risks and threats that leading organizations are concerned about, and how they are attempting to secure their most valuable information in the face of them.

Salesforce: A Business-Critical Cloud Application

For many businesses that utilize Salesforce®, it would be difficult to maintain normal business operations without the application’s cloud storage facility. This is due to Salesforce’s dramatic growth within enterprises. The information stored in Salesforce has expanded precipitously, and now includes:

Highly proprietary, valuable customer and prospect information accumulated through years of relationship building as well as automated gathering processes;

Detailed information regarding employees and the organization;

Ordering systems that use price books, products and contracts;

Financial information that feeds into corporate accounting systems which in turn generate GAAP audited financials.

Salesforce Holds the “Crown Jewels” of the Enterprise

What exactly does this information look like? It includes credit card numbers, banking account details, protected health information, and personally identifiable information of all kinds – all such data is now held in the Salesforce application. This information about customers and prospects is essential to an organization’s trust between customers and its advantage in the marketplace. Clearly, Salesforce now holds information considered to be the “crown jewels” of the enterprise.

Departing Employees

Now more than ever, organizational data is at risk to departing employees looking to gain a personal advantage in the marketplace. According to the IBM X-Force Cybersecurity Report, 60% of all cybersecurity attacks are caused by employees inside an organization. These employees are most commonly referred to as “insider threats.”

In a study of 150 data theft cases, the recover report found that:

60% stole proprietary information in order to secure a new position with a company competitive to the data owner;

In 30% of the cases, the internal perpetrator’s motivation was to use the stolen information for the creation of new business.

Legal and Compliance Considerations

Businesses are increasingly prepared to bring suit against those who commit data theft. The identity theft resource report, www.edtheftcenter.org, cites numerous examples of businesses which have brought lawsuits against former employees who have been accused of stealing confidential customer information. Furthermore, there have never been more stringent regulations directed toward data compliance and the enforcement of privacy and security standards across the globe than now (i.e. FFIEC, FINRA, HIPAA, FCA, GDPR, and more).

 Salesforce Event Monitoring

To avoid these headaches and threats to business, organizations must implement a user activity monitoring and behavioral analytics program to protect sensitive and business-critical data. Reliable and legally sound user activity monitoring is not possible without audit logs.

Salesforce administrators know all too well that audit logs have historically been made available only through Salesforce Customer Service at considerable cost in both time and money.

To address this limitation, Salesforce has developed and released Event Monitoring under Salesforce Shield. Salesforce event monitoring files (audit log files) are automatically accessible through APIS and enable important aspects of data protection, including:

Forensic investigations;

Continuous monitoring with alerts and filtering;

Flexible multi-criteria reporting and filtering;

Governance reporting;

Audit log storage, encryption and archives

However, Salesforce event monitoring files are clear text and are not human-readable without programmatic or manual manipulation.

FairWarning® for Salesforce

FairWarning® for Salesforce leverages these event monitoring files to provide data protection and governance through user activity monitoring. By automatically turning your event monitoring files into human-readable text, FairWarning® enables business users to easily interpret and gain insights from event log data. FairWarning® for Salesforce continuously monitors for unusual access, proactively alerts you of potential incidents, enables rapid investigations of user activity and tests for satisfied regulatory requirements.

In the next blog posts you will learn the Business Case Elements for FairWarning® for Salesforce, which include:

Usage and Adoption – unnecessary licenses;

Information Security – time spent monitoring and in forensic investigations

Compliance – time spent on governance, audits, and annual reporting;

Performance – how to increase performance.